ExamGecko
Home Home / Salesforce / Certified MuleSoft Developer II

Salesforce Certified MuleSoft Developer II Practice Test - Questions Answers, Page 2

Question list
Search
Search

List of questions

Search

Related questions











Mule application A is deployed to CloudHub and is using Object Store v2. Mute application B is also deployed to CloudHub.

Which approach can Mule application B use to remove values from Mule application A'S Object Store?

A.
Object Store v2 REST API
A.
Object Store v2 REST API
Answers
B.
CloudHub Connector
B.
CloudHub Connector
Answers
C.
Object Store Connector
C.
Object Store Connector
Answers
D.
CloudHub REST API
D.
CloudHub REST API
Answers
Suggested answer: A

Explanation:

To remove values from Mule application A's Object Store v2, Mule application B can use Object Store v2 REST API. This API allows performing operations on Object Store v2 resources using HTTP methods, such as GET, POST, PUT, and DELETE. Mule application B can use the DELETE method to remove values from Mule application A's Object Store v2 by specifying the object store ID and the key of the value to delete.

Reference: https://docs.mulesoft.com/object-store/osv2-apis

Refer to the exhibit.

A Mule application pom.xml configures the Maven Resources plugin to exclude parsing binary files in the project's src/main/resources/certs directory.

Which configuration of this plugin achieves a successful build?

A)

B)

C)

D)

A.
Option A
A.
Option A
Answers
B.
Option B
B.
Option B
Answers
C.
Option C
C.
Option C
Answers
D.
Option D
D.
Option D
Answers
Suggested answer: C

Explanation:

To configure the Maven Resources plugin to exclude parsing binary files in the project's src/main/resources/certs directory, option C should be used. This option specifies that any files with .cer or .jks extensions under the certs directory should be excluded from filtering. Filtering is a process of replacing placeholders with actual values in resource files during the build process. Binary files should not be filtered because they may become corrupted or unusable.

Reference: https://maven.apache.org/plugins/maven-resources-plugin/examples/filter.html https://maven.apache.org/plugins/maven-resources-plugin/examples/include-exclude.html

The flow is invoicing a target API. The API's protocol is HTTPS. The TLS configuration in the HTTP Request Configuration global element is set to None. A web client submits a request to http:localhost:8081/vehicles.

If the certificate of the target API is signed by a certificate authority (CA), what is true about the HTTP Request operation when the flow executes?

A.
The HTTP Request operation will succeed if the CA'S certificate is present in the JRE's default keystore
A.
The HTTP Request operation will succeed if the CA'S certificate is present in the JRE's default keystore
Answers
B.
The HTTP Request operation will succeed if the CA's certificate is present in the JRE's default truststore.
B.
The HTTP Request operation will succeed if the CA's certificate is present in the JRE's default truststore.
Answers
C.
The HTTP Request operation will always succeed regardless of the CA
C.
The HTTP Request operation will always succeed regardless of the CA
Answers
D.
The HTTP Request operation will always fail regardless of the CA
D.
The HTTP Request operation will always fail regardless of the CA
Answers
Suggested answer: B

Explanation:

The HTTP Request operation will use the default truststore of the JRE to validate the certificate of the target API. If the CA's certificate is present in the truststore, the operation will succeed. Otherwise, it will fail with a handshake exception.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/tls-configuration#tls-default

When a client and server are exchanging messages during the mTLS handshake, what is being agreed on during the cipher suite exchange?

A.
A protocol
A.
A protocol
Answers
B.
The TLS version
B.
The TLS version
Answers
C.
An encryption algorithm
C.
An encryption algorithm
Answers
D.
The Public key format
D.
The Public key format
Answers
Suggested answer: C

Explanation:

A cipher suite is a set of cryptographic algorithms that are used to secure the communication between a client and a server. A cipher suite consists of four components: a key exchange algorithm, an authentication algorithm, an encryption algorithm, and a message authentication code (MAC) algorithm. During the cipher suite exchange, the client and the server agree on which encryption algorithm to use for encrypting and decrypting the data.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/tls-configuration#cipher-suites

A custom policy needs to be developed to intercept all cutbound HTTP requests made by Mule applications.

Which XML element must be used to intercept outbound HTTP requests?

A.
It is not possible to intercept outgoing HTTP requests, only inbound requests
A.
It is not possible to intercept outgoing HTTP requests, only inbound requests
Answers
B.
http-policy:source
B.
http-policy:source
Answers
C.
htt-policy:operation
C.
htt-policy:operation
Answers
D.
http-policy:processor
D.
http-policy:processor
Answers
Suggested answer: B

Explanation:

The http-policy:processor element is used to intercept outbound HTTP requests made by Mule applications. It allows customizing the request before it is sent to the target API and modifying the response after it is received from the target API.

Reference: https://docs.mulesoft.com/api-manager/2.x/policy-mule4-custom-policy#policy-xml-file

An API has been built to enable scheduling email provider. The front-end system does very little data entry validation, and problems have started to appear in the email that go to patients. A validate-customer'' flow is added validate the data.

What is he expected behavior of the 'validate-customer'' flow?

A.
If only the email address Is invalid a VALIDATION.INVALID_EMAIL error is raised
A.
If only the email address Is invalid a VALIDATION.INVALID_EMAIL error is raised
Answers
B.
If the email address is invalid, processing continues to see if the appointment data and customer name are also invalid
B.
If the email address is invalid, processing continues to see if the appointment data and customer name are also invalid
Answers
C.
If the appointment date and customer name are invalid, a SCHEDULE:INVALID_APPOINTMENT_DATE error is raised
C.
If the appointment date and customer name are invalid, a SCHEDULE:INVALID_APPOINTMENT_DATE error is raised
Answers
D.
If all of the values are invalid the last validation error is raised:SCHEDULE:INVALID_CUSTOMER_NAME
D.
If all of the values are invalid the last validation error is raised:SCHEDULE:INVALID_CUSTOMER_NAME
Answers
Suggested answer: A

Explanation:

The validate-customer flow uses an until-successful scope to validate each field of the customer data. The until-successful scope executes its processors until they succeed or exhausts the maximum number of retries. If any processor fails, it raises an error and stops executing the remaining processors. Therefore, if only the email address is invalid, a VALIDATION.INVALID_EMAIL error is raised and the validation of appointment date and customer name is skipped.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/until-successful-scope

When implementing a synchronous API where the event source is an HTTP Listener, a developer needs to return the same correlation ID back to the caller in the HTTP response header.

How can this be achieved?

A.
Enable the auto-generate CorrelationID option when scaffolding the flow
A.
Enable the auto-generate CorrelationID option when scaffolding the flow
Answers
B.
Enable the CorrelationID checkbox in the HTTP Listener configuration
B.
Enable the CorrelationID checkbox in the HTTP Listener configuration
Answers
C.
Configure a custom correlation policy
C.
Configure a custom correlation policy
Answers
D.
NO action is needed as the correlation ID is returned to the caller in the response header by default
D.
NO action is needed as the correlation ID is returned to the caller in the response header by default
Answers
Suggested answer: D

Explanation:

When implementing a synchronous API where the event source is an HTTP Listener, Mule automatically propagates some message attributes between flows via outbound and inbound properties. One of these attributes is correlation ID, which is returned to the caller in the response header by default as MULE_CORRELATION_ID.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/about-mule-message#message-attributes

Which statement is true about using mutual TLS to secure an application?

A.
Mutual TLS requires a hardware security module to be used
A.
Mutual TLS requires a hardware security module to be used
Answers
B.
Mutual TLS authenticates the identity of the server before the identity of the client
B.
Mutual TLS authenticates the identity of the server before the identity of the client
Answers
C.
Mutual TLS ensures only authorized end users are allowed to access an endpoint
C.
Mutual TLS ensures only authorized end users are allowed to access an endpoint
Answers
D.
Mutual TLS increases the encryption strength versus server-side TLS alone
D.
Mutual TLS increases the encryption strength versus server-side TLS alone
Answers
Suggested answer: B

Explanation:

Mutual TLS (mTLS) is an extension of TLS that requires both parties (client and server) to present their certificates to each other during the handshake process. This way, both parties can verify each other's identity and establish a secure connection. The authentication of the server happens before the authentication of the client, as the server sends its certificate first and then requests the client's certificate.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/tls-configuration#mutual-authentication

Which statement is true when using XML SDK for creating custom message processors?

A.
Properties are fields defined by an end user of the XML SDK component and serve as a global configuration for the entire Mule project in which they are used
A.
Properties are fields defined by an end user of the XML SDK component and serve as a global configuration for the entire Mule project in which they are used
Answers
B.
An XML SDK provides both inbound and outbound operations
B.
An XML SDK provides both inbound and outbound operations
Answers
C.
Operations can be reused in recursive calls
C.
Operations can be reused in recursive calls
Answers
D.
All operations are public
D.
All operations are public
Answers
Suggested answer: A

Explanation:

When using XML SDK for creating custom message processors, all operations are public by default and can be used by any Mule application that imports them. There is no way to make an operation private or protected in XML SDK.

Reference: https://docs.mulesoft.com/mule-sdk/1.1/xml-sdk#operations

Which type of cache invalidation does the Cache scope support without having to write any additional code?

A.
Write-through invalidation
A.
Write-through invalidation
Answers
B.
White-behind invalidation
B.
White-behind invalidation
Answers
C.
Time to live
C.
Time to live
Answers
D.
Notification-based invalidation
D.
Notification-based invalidation
Answers
Suggested answer: C

Explanation:

The Cache scope supports time to live (TTL) as a cache invalidation strategy without having to write any additional code. TTL specifies how long the cached response is valid before it expires and needs to be refreshed. The Cache scope also supports custom invalidation strategies using MEL or DataWeave expressions.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/cache-scope#cache_invalidation

Total 60 questions
Go to page: of 6